Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition /
Chapter 3: Target Scoping ; Gathering client requirements; Creating the customer requirements form; The deliverables assessment form; Preparing the test plan; The test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; Chapter 4 : Inf...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Publishing,
2016.
|
Edición: | Third edition. |
Colección: | Community experience distilled.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover ; Copyright; Credits; Disclaimer; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Beginning with Kali Linux ; A brief history of Kali Linux; Kali Linux tool categories; Downloading Kali Linux; Using Kali Linux; Running Kali using Live DVD; Installing on a hard disk; Installing Kali on a physical machine; Installing kali on a virtual machine; Saving or Moving the Virtual Machine; Installing Kali on a USB disk; Configuring the Virtual Machine; VirtualBox Guest Additions; Setting up Networking; Setting up a wired connection.
- Setting up a wireless connectionUpdating Kali Linux; Network services in Kali Linux; HTTP; MySQL; SSH; Installing a vulnerable server; Installing additional weapons; Installing the Nessus vulnerability scanner; Installing the Cisco password cracker; Summary; Chapter 2: Penetration Testing Methodology ; Types of penetration testing; Black box testing; White box testing; Gray box testing; Deciding on a test; Vulnerability assessment versus penetration testing; Security testing methodologies; Open Source Security Testing Methodology Manual; Key features and benefits of OSSTMM.
- Information Systems Security Assessment FrameworkKey features and benefits of ISSAF; Open Web Application Security Project; Key features and benefits of OWASP; Web Application Security Consortium Threat Classification; Key features and benefits of WASC-TC; Penetration Testing Execution Standard; Key features and benefits of PTES; General penetration testing framework; Target scoping; Information gathering; Target discovery; Enumerating target; Vulnerability mapping; Social engineering; Target exploitation; Privilege escalation; Maintaining access; Documentation and reporting; The ethics.
- SimplyEmailMetagoofil; Accessing leaked information; The Onion Router; Installing the TOR Browser; Summary; Chapter 5: Target Discovery ; Starting off with target discovery; Identifying the target machine; ping; arping; fping; hping3; nping; alive6; detect-new-ip6; passive_discovery6; nbtscan; OS fingerprinting; p0f; Nmap; Summary; Chapter 6: Enumerating Target ; Introducing port scanning; Understanding the TCP/IP protocol; Understanding the TCP and UDP message format; The network scanner; Nmap; Nmap target specification; Nmap TCP scan options; Nmap UDP scan options; Nmap port specification.